-
漏洞信息

-
漏洞描述

The 'Web Publish' example script in ColdFusion Server contains a flaw that may allow a remote attacker to bypass access restrictions. The issue is triggered when sending a HTTP request with a spoofed Host variable in the HTTP header. It is possible that the flaw may allow a remote attacker to upload and execute malicious files resulting in a loss of integrity.

-
时间线

公开日期:
2001-08-07

发现日期:
Unknow

利用日期:Unknow

解决日期:Unknow

-
解决方案

Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround: Remove the CFDOCS directory.

-
漏洞讨论

By design, sample applications do not permit access from any other source than the ColdFusion server itself. A flaw exists in two sample applications which could enable a remote user to bypass this feature. Allowing the user to take any desired action including creating files, viewing files, or executing arbitrary commands on the target host.

-
漏洞利用

Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com &lt;mailto:vuldb@securityfocus.com&gt;.

-
解决方案

Allaire Macromedia will not be releasing a patch for this issue, instead it is suggested that the CFDOCS directory is removed from production environments.